Event Updates

Latest Content tagged with Black Hat
Page 1 / 2   >   >>
Black Hat Europe: Stock Up On New Security Tools and Training
Event Updates  |  11/20/2018  | 
If you work in cybersecurity it's important to stay abreast of the latest tools and techniques, and theres no better place to do that than Black Hat Europe in London next month.
Black Hat Europe Speaker Q&A: SoarTechs Fernando Maymi on Synthetic Humans
Event Updates  |  11/16/2018  | 
Ahead of his Black Hat Europe appearance, SoarTechs Fernando Maymi explains how and why synthetic humans are critical to the future of cybersecurity.
Learn How to Better Protect your Network at Black Hat Europe
Event Updates  |  11/15/2018  | 
Whether youre sussing out vulnerabilities or defending enterprise networks, Black Hat Europes lineup of Briefings, Trainings, and Arsenal tools will help you take things to the next level.
Sharpen Your Malware-Fighting Skills at Black Hat Europe
Event Updates  |  11/14/2018  | 
Dont miss out on the Black Hat Briefings, Trainings, and Arsenal tools that will equip you with the knowledge and skills you need to deal with todays top malware.
The Executive Summit Returns to Black Hat Europe 2018
Event Updates  |  11/8/2018  | 
This day-long event for CISOs and execs will show you the way to next-level skills, strategies, and techniques that will bolster your relevance and wow the board.
Black Hat Europe London: Learn How to Unearth Critical Vulnerabilities
Event Updates  |  11/6/2018  | 
Black Hats lineup of Arsenal tools, Briefings, and in-depth Trainings will equip you with the skills you need to protect todays modern devices and operating systems.
Smart City Security Testing: Research -> Tooling -> Methodology -> Go!
Event Updates  |  11/5/2018  | 
The idea and concept of Smart Cities is certainly gaining traction. Cities around the world are already investing in trials, testbeds and in many cases operational system deployments such as smart energy, smart lighting, smart parking; the list goes on...
Build Security into Container Deployment
Event Updates  |  11/5/2018  | 
Container adoption has skyrocketed, and with it the importance of securing the applications that DevOps teams create and deploy using this method of OS virtualization.
Protect DNS, Protect business
Event Updates  |  10/29/2018  | 
DNS plays a critical role in every network. However, it is often overlooked by many security solutions and not integrated into cyber hygiene programs, leaving an easily-accessed back door open for criminals into many networks.
The Patching Paradox: A Path to Intelligent Vulnerability Management
Event Updates  |  10/22/2018  | 
Imagine: Youre out at sea, sailing through treacherous and uncharted waters. The tips of sharp rocks jutting from the waves give some forewarning of danger, but beneath the surface, twisting reefs and shallow sandbanks threaten to run you aground.
What Keeps the CISO Awake at Night
Event Updates  |  10/22/2018  | 
How to keep your CISO sleeping soundly
THE NEW NETWORK EDGE THE SERVER
Event Updates  |  10/22/2018  | 
One of the most damaging aspects of modern cyberattacks is when an attacker achieves persistence the ability to penetrate a network and dwell for long periods of time, moving from system to system and gathering valuable data. The goal of the security industry must be to deny an attacker from moving freely once inside.
Deep Dives: New Security Flaws in Apple and Microsoft products at Black Hat Europe
Event Updates  |  10/11/2018  | 
With Black Hat Europe coming to London in a few months, organizers share three of the most promising Briefings slated for the December event.
Learn to Understand and Combat New Threats at Black Hat Europe
Event Updates  |  10/9/2018  | 
As we begin to settle into autumn, Black Hat organizers are hard at work lining up a ton of great content for the premier information security events return to London this December.
Dont Miss the Action-Packed Arsenal Offerings at Black Hat Europe
Event Updates  |  10/4/2018  | 
Organizers are hard at work preparing for another remarkable Black Hat Europe event in London this December. Here's a sneak peek at two fantastic demos youll see there.
Sharpen Your Security Skills at Black Hat Trainings Chicago!
Event Updates  |  10/2/2018  | 
Black Hat is bringing its highly-regarded Trainings to Chicago next month, October 22 and 23.Don't miss this opportunity to develop your skills in some of the most technical, hands-on security courses available.
Learn New Ways to Spot and Plug Vulnerabilities at Black Hat Europe
Event Updates  |  9/27/2018  | 
Come out to London Dec 3-6 and learn to use new tools (including the laws of physics) to identify hidden vulnerabilities.
Black Hat Europe Returns to The Excel in London December 3-6
Event Updates  |  9/25/2018  | 
Get expert insight into stopping deep fakes, blockchain attacks, and Windows 10 vulnerabilities.
Transparent Orchestration of Security to Accelerate the Digital Transformation Journey
Event Updates  |  6/27/2018  | 
The extension of infrastructures from on-premises IT environments to multiple cloud ecosystems delivers organizations newly transformed digital services with increased value.
Black Hat USA 2018:
Comandeering Voice Enabled Devices
Event Updates  |  6/18/2018  | 
Researchers Amichai Shulman, Ron Marcovich, Tal Be'ery and Yuval Ron will detail a vulnerability of Microsofts Cortana in their Black Hat USA Briefing Open Sesame: Picking Locks with Cortana.
Announcing: Black Hat Europe 2018
Event Updates  |  6/13/2018  | 
Black Hat Europe returns to the ExCeL London, December 3-6, 2018
Restoring Business Velocity and Trust in Users with Risk-Adaptive Protection
Event Updates  |  6/6/2018  | 
A paradigm shift in thinking is needed for the cybersecurity industry.
Black Hat Trainings, October 22-23 at the Sheraton Grand in Chicago
Event Updates  |  6/4/2018  | 
2-day Black Hat Trainings offered at the Sheraton Grand in Chicago, October 22-23
Black Hat USA 2018:
More than 110 Briefings Announced!
Event Updates  |  5/30/2018  | 
Black Hat USA returns to Las Vegas for its 21st year, August 4-7, 2018 with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall, and more.
Black Hat Asia 2018:
First Briefings Announced
Event Updates  |  12/13/2017  | 
Black Hat Asia returns to Singapore, March 20-23, 2018 with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall, and more.
Black Hat Europe 2017:
New Briefings Announced
Event Updates  |  10/18/2017  | 
Final Batch of Black Hat Europe 2017 Briefings Released
Black Hat Europe 2017:
New Briefings Announced
Event Updates  |  9/27/2017  | 
We are pleased to announce More Briefings selected for presentation at Black Hat Europe 2017!
Black Hat Europe 2017:
First Briefings Announced
Event Updates  |  9/20/2017  | 
We are pleased to announce the first Briefings selected for presentation at Black Hat Europe 2017!
Black Hat USA 2017:
Know Before You Go
Event Updates  |  7/19/2017  | 
Black Hat USA 2017:
Attendee Survey Results
Event Updates  |  7/6/2017  | 
Today, Black Hat releases its third annual research report entitled, Portrait of an Imminent Cyber Threat. Download a copy for actionable insights and information on critical industry trends.
Black Hat USA 2017:
Data Forensices and Incident Response Roadmap
Event Updates  |  6/5/2017  | 
Strong data forensics and incident response capabilities are critical for agile breach detection and mitigation. Challenges of multiple access points, the influx of mobile and connected devices and the large amount of resulting data makes this an arduous task. Build these highly sought after skills at Black Hat USA with the Data Forensics and Incident Response track
Black Hat USA 2017:
Predominance of Internet of Things
Event Updates  |  5/30/2017  | 
Expected rise in IoT breaches and complexities points to a need for advanced knowledge of IoT practicalities and fundamentals. Navigate the dynamic threat landscape with these Black Hat USA offerings and view the Briefings IoT Track to begin customizing your Black Hat USA experience.
Black Hat USA 2017: 35 New Briefings Announced
Event Updates  |  5/4/2017  | 
We are pleased to announce 35 new Briefings selected for presentation at Black Hat USA 2017!
Black Hat USA 2017:
Security Challenges in the Enterprise
Event Updates  |  5/2/2017  | 
Growing costs of incident management and remediation have heightened the need for new breach mitigation strategies and tools. Enterprise systems are particularly susceptible to compromise with unique challenges to risk visibility and assessment. Unobstructed view and comprehensive knowledge of the threat surface is critical to preempting attack vectors and mitigating breach incidents.
Black Hat USA 2017: 15 New Briefings Announced
Event Updates  |  4/27/2017  | 
We are pleased to announce 15 new Briefings selected for presentation at Black Hat USA 2017!
Black Hat Review Board Spotlight:
Beyond the Bio with Jamie Butler
Event Updates  |  3/14/2017  | 
Get to know the Black Hat Review Board in a new interview series, Beyond the Bio. In this series, Black Hat Review Board Members offer insight from their favorite exploits and pastimes to their most memorable Black Hat experiences.
Black Hat Asia 2017:
CISOs Must Get Proactive about the Internet of Things
Event Updates  |  3/13/2017  | 
These four steps will help reduce the risk from looming IoT attacks
Black Hat Asia 2017:
Pentesting for Vulnerabilities
Event Updates  |  3/9/2017  | 
Continually testing for vulnerabilities is critical to threat detection and prevention
Black Hat Asia 2017:
Securing Mobile Devices
Event Updates  |  3/8/2017  | 
Opportunities for phishing, ransomware, cryptocurrency mining and other attacks are endless. Understanding mechanisms for compromising Android and iOS systems is crucial to detecting and preventing security breaches.
Black Hat Asia 2017:
Threat & Vulnerability Management: Knowing Youre Secure
Event Updates  |  3/7/2017  | 
Threat and vulnerability management is a foundational technique that every security professional should embrace. Heres why.
Black Hat Europe 2016:
Introducing RegTech: Cloud-based Tools For Regulatory Compliance
Event Updates  |  10/25/2016  | 
As regulatory requirements grow in volume and complexity in Europe and globally, cloud computing is emerging as a key tool to help companies manage compliance processes.
Black Hat Europe 2016:
How Artificial Intelligence Will Liberate Security
Event Updates  |  10/24/2016  | 
The security paradigm is shifting to one of security as a science with AI as the primary agent for that revolutionary change.
Black Hat Europe 2016:
The 7 Habits of Highly Effective Security Operations
Event Updates  |  10/21/2016  | 
Why cyber analysts spend nearly 75% if their time on false positives, and what to do about it.
Black Hat Europe 2016:
5 Best Practices for Defending Against a Cyberattack
Event Updates  |  10/19/2016  | 
The proactive management of cybersecurity relies on an intelligence-led approach that can either prevent a breach from happening, or make sure that it is quickly detected and remediated.
Black Hat Europe 2016:
Whats Next For Ransomware & How To Prevent It
Event Updates  |  10/18/2016  | 
Ransomware has existed in various forms for decades, but in the last three years, cybercriminals have perfected its key components. Heres what you need to know now.
Black Hat Europe 2016:
BooleBox: A New Perspective On Enterprise Data Protection
Event Updates  |  10/10/2016  | 
The thought of sensitive data ending up in the wrong hands can keep both IT administrators and top-managers awake at night. As the latest trends show, many organizations are gaining more and more awareness about the various existing threats to their intellectual property and confidential information.
Page 1 / 2   >   >>


New Bluetooth Hack Affects Millions of Vehicles
Dark Reading Staff 11/16/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19406
PUBLISHED: 2018-11-21
kvm_pv_send_ipi in arch/x86/kvm/lapic.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where the apic map is uninitialized.
CVE-2018-19407
PUBLISHED: 2018-11-21
The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.
CVE-2018-19404
PUBLISHED: 2018-11-21
In YXcms 1.4.7, protected/apps/appmanage/controller/indexController.php allow remote authenticated Administrators to execute any PHP code by creating a ZIP archive containing a config.php file, hosting the .zip file at an external URL, and visiting index.php?r=appmanage/index/onlineinstall&url= ...
CVE-2018-19387
PUBLISHED: 2018-11-20
format_cb_pane_tabs in format.c in tmux 2.7 through 2.8 might allow attackers to cause a denial of service (NULL Pointer Dereference and application crash) by arranging for a malloc failure.
CVE-2018-19388
PUBLISHED: 2018-11-20
FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read, access violation, and application crash) via TIFF data because of a ConvertToPDF_x86!ReleaseFXURLToHtml issue.